Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 23:47
Static task
static1
Behavioral task
behavioral1
Sample
deed contract.11.20.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
deed contract.11.20.doc
Resource
win10v20201028
General
-
Target
deed contract.11.20.doc
-
Size
143KB
-
MD5
98ec9df6254d78b1fc1abdf7090da3f7
-
SHA1
6642cb5d474a9ed788fb5a33cc5b72c6f825c1f3
-
SHA256
37db367c01e40ee2f05a5966d6670e07fd3292c01f4da8ffd77c0e3c96a79464
-
SHA512
dfbc5ff2b935b905ad554b30994dc0446d93e0d8eaeb279ab33c376b35ff1cad6b21931da920c103ab435ac1c2968bcfcc8c3e0db2c3ae2222f5b86ab0460354
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 352 576 rundll32.exe 67 -
Blacklisted process makes network request 6 IoCs
flow pid Process 36 2344 rundll32.exe 38 2344 rundll32.exe 40 2344 rundll32.exe 42 2344 rundll32.exe 44 2344 rundll32.exe 46 2344 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 rundll32.exe 2344 rundll32.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 576 wrote to memory of 352 576 WINWORD.EXE 79 PID 576 wrote to memory of 352 576 WINWORD.EXE 79 PID 352 wrote to memory of 2344 352 rundll32.exe 80 PID 352 wrote to memory of 2344 352 rundll32.exe 80 PID 352 wrote to memory of 2344 352 rundll32.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\deed contract.11.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SYSTEM32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\FpVjp.pdf,ShowDialogA -r2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\FpVjp.pdf,ShowDialogA -r3⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-